CyberProtex
  • Home
  • SERVICES
    • Managed Security
    • Identity and Access Management
    • Continuous Monitoring
    • Endpoint Protection
    • Incident Response
    • Compliance Services >
      • CMMC Certified Services >
        • CMMC - Provisional Assessors (PA)
      • RMF and eMASS Compliance
      • DFARS Compliance
    • Security Awareness Training Services
    • Creative Content
  • SOFTWARE
    • Software Engineering
    • eMASS Simulator Software
    • CyberLMS Software
    • Vulnerability Genius Software
    • Test Prep App - CyberLMS Software
    • Cyber Range Software - On Demand - Azure Labs
    • Security Awareness Training Software
    • Hackme - Software
  • Training
    • Schedule
    • Online Courses >
      • CyberLMS - eLearning
      • eLearning
      • Video Training
    • CyberLMS
    • Lunch and Learn Schedule
    • Certification Courses >
      • CISSP
      • Security+
      • One-day Security+
      • Linux+
      • Kali Linux Pro
      • Mobile Forensics Professional
      • Red Hat - SA
      • CEH
      • CASP+
      • CHFI
      • CISM
      • CAP
      • CCNA
      • CND
      • ISSEP
      • MTA
      • Network+
    • Security Awareness Training
    • Cyber Workshops >
      • Cyber Resiliency TTX
      • eMASS
      • FEMA Cyber Resiliency TTX
    • DHS-Training
    • Training Center
    • Cybersecurity Tools
    • Summer Camps
    • YouTube Channel
  • Meet the Team
    • Partners
    • Corporate-Offices
    • Careers
    • Community Outreach
  • Contact
  • Shop
  • Product
CyberProtex - Types of Viruses Matching Game

CyberProtex - Types of Computer Virus Terms Matching Game

Drag and Drop the Terms Numbers to the appropriate Definition

Macro Virus
Stealth Virus
Polymorphic Virus
Boot sector Virus
Multipartite Virus
Program or File Virus
Infects executables (other programs, with affixes such as EXE, BIN, COM, SYS)
Infects boot sectors on hard and floppy disks
A hybrid of a program and boot sector virus
Triggers on a command in Microsoft Office Commonly affects Word & Excel
Uses various tactics to avoid detection.
Uses encryption to foil detection, so that it appears differently in each infection.
Picture
CyberProtex, LLC - 2012-2020
ContactUs@CyberProtex.com
256-401-7072
Picture
  • Home
  • SERVICES
    • Managed Security
    • Identity and Access Management
    • Continuous Monitoring
    • Endpoint Protection
    • Incident Response
    • Compliance Services >
      • CMMC Certified Services >
        • CMMC - Provisional Assessors (PA)
      • RMF and eMASS Compliance
      • DFARS Compliance
    • Security Awareness Training Services
    • Creative Content
  • SOFTWARE
    • Software Engineering
    • eMASS Simulator Software
    • CyberLMS Software
    • Vulnerability Genius Software
    • Test Prep App - CyberLMS Software
    • Cyber Range Software - On Demand - Azure Labs
    • Security Awareness Training Software
    • Hackme - Software
  • Training
    • Schedule
    • Online Courses >
      • CyberLMS - eLearning
      • eLearning
      • Video Training
    • CyberLMS
    • Lunch and Learn Schedule
    • Certification Courses >
      • CISSP
      • Security+
      • One-day Security+
      • Linux+
      • Kali Linux Pro
      • Mobile Forensics Professional
      • Red Hat - SA
      • CEH
      • CASP+
      • CHFI
      • CISM
      • CAP
      • CCNA
      • CND
      • ISSEP
      • MTA
      • Network+
    • Security Awareness Training
    • Cyber Workshops >
      • Cyber Resiliency TTX
      • eMASS
      • FEMA Cyber Resiliency TTX
    • DHS-Training
    • Training Center
    • Cybersecurity Tools
    • Summer Camps
    • YouTube Channel
  • Meet the Team
    • Partners
    • Corporate-Offices
    • Careers
    • Community Outreach
  • Contact
  • Shop
  • Product